Books on the topic 'SeChry'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'SeChry.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Baumgart, Rainer. Secure Networking — CQRE [Secure] ’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46701-7.
Full textLeader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.
Find full textHammad, Mohamed, Gauhar Ali, Mohammed A. El-Affendi, Yassine Maleh, and Ahmed A. Abd El-Latif. Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038.
Full textEberspächer, Jörg, ed. Sichere Daten, sichere Kommunikation / Secure Information, Secure Communication. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/978-3-642-85103-2.
Full text), National Institute of Standards and Technology (U S. Secure hash standard. Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.
Find full text), National Institute of Standards and Technology (U S. Secure hash standard. Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.
Find full textAsplund, Mikael, and Simin Nadjm-Tehrani, eds. Secure IT Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70852-8.
Full textAhmed, Mohiuddin, and Paul Haskell-Dowland. Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635.
Full textTuveri, Nicola, Antonis Michalas, and Billy Bob Brumley, eds. Secure IT Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91625-1.
Full textKumar, Vimal, Amartya Sen, and Sanjay Madria. Secure Sensor Cloud. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-031-01527-4.
Full textJøsang, Audun, and Bengt Carlsson, eds. Secure IT Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34210-3.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15546-8.
Full textGruschka, Nils, ed. Secure IT Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03638-6.
Full textYao, Jiewen, and Vincent Zimmer. Building Secure Firmware. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6106-4.
Full textParet, Dominique, and Jean-Paul Huon. Secure Connected Objects. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119426639.
Full textBrumley, Billy Bob, and Juha Röning, eds. Secure IT Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47560-8.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552338.
Full textBuchegger, Sonja, and Mads Dam, eds. Secure IT Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5.
Full textChoo, Kim-Kwang Raymond. Secure Key Establishment. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-87969-7.
Full textPerrig, Adrian, and J. D. Tygar. Secure Broadcast Communication. Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0229-6.
Full textGritzalis, Dimitris A., ed. Secure Electronic Voting. Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5.
Full textAskarov, Aslan, René Rydhof Hansen, and Willard Rafnsson, eds. Secure IT Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35055-0.
Full textRiis Nielson, Hanne, and Dieter Gollmann, eds. Secure IT Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41488-6.
Full textPreneel, Bart, ed. Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23556-6.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75248-6.
Full textReardon, Joel. Secure Data Deletion. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28778-2.
Full textBernsmed, Karin, and Simone Fischer-Hübner, eds. Secure IT Systems. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11599-3.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85259-9.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32873-2.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04219-5.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11844662.
Full textJonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b99822.
Full textJajodia, Sushil, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang, eds. Secure Cloud Computing. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9278-8.
Full textLipmaa, Helger, Aikaterini Mitrokotsa, and Raimundas Matulevičius, eds. Secure IT Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70290-2.
Full textVitek, Jan, and Christian D. Jensen, eds. Secure Internet Programming. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2.
Full textKussin, Annette. Secure Parent, Secure Child. Guernica Editions, Incorporated, 2023.
Find full textDrennan, Gerard. Secure Recovery. Willan, 2013. http://dx.doi.org/10.4324/9780203129173.
Full textBhargav, Abhay, and B. V. Kumar. Secure Java. CRC Press, 2010. http://dx.doi.org/10.1201/ebk1439823514.
Full text